Understanding Cisco Cybersecurity Fundamentals

Course Description

The Understanding Cisco Cybersecurity Fundamentals (SECFND) v1.0 course provides you with an understanding of network infrastructure devices, operations and vulnerabilities of the TCP/IP protocol suite, basic information security concepts, common network application operations and attacks, the Windows and Linux operating systems, and the types of data that are used to investigate security incidents.

After completing this course, you will have basic knowledge that is required to perform the job role of an entry-level cybersecurity analyst in a threatcentric security operations center.


  • Cisco certification (Cisco CCENT certification or higher)
  • Relevant industry certification [(ISC)2, CompTIA Security+, EC-Council, GIAC, ISACA]
  • Cisco Networking Academy letter of completion (CCNA 1 and CCNA 2)
  • Windows expertise: Microsoft Specialist, MCSA, MCSE), CompTIA (A+,Network+, Server+)
  • Linux expertise: CompTIA (Linux+), Linux Professional Institute (LPI) certification, Linux
  • Foundation (LFCS, LFCE), Red Hat (RHCSA, RHCE, RHCA), Oracle Linux (OCA, OCP)

Who Should Attend

Security Operations Center – Security Analyst, Computer/Network Defense Analysts, Computer Network Defense Infrastructure Support Personnel, Future Incident Responders and Security Operations Center (SOC) personnel, Students beginning a career- entering the cybersecurity field, Cisco Channel Partners

Course Information

Length: 5 day

Format: Lecture and Lab

Delivery Method: Virtual / Onsite

Max. Capacity: 16

Learning Objectives

  • Describe, compare and identify various network concepts
  • Fundamentals of TCP/IP
  • Describe and compare fundamental security concepts
  • Describe network applications and the security challenges
  • Understand basic cryptography principles.
  • Understand endpoint attacks, including interpreting log data to identify events in Windows and Linux
  • Develop knowledge in security monitoring, including identifying sources and types of data and events
  • Know various attack methods, security weaknesses, evasion methods, and remote versus local exploits


1: Explore the TCP/IP Protocol Suite
2: Explore the Network Infrastructure
3: Explore TCP/IP Attacks
4: Explore Cryptographic Technologies
5: Explore Network Applications
6: Explore Network Application Attacks
7: Explore the Windows Operating System
8: Explore the Linux Operating System
9: Explore Endpoint Attacks
10: Explore Network Security Technologies
11: Explore Endpoint Security
12: Explore Network Applications